INCO-TRUST. INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities! Canada US S. Korea Japan.
|
|
|
- Audra Hensley
- 10 years ago
- Views:
Transcription
1 INCO-TRUST: Intl Co-Operation in Trustworthy, Secure and Dependable ICT Infrastructures Neeraj Suri, TU Darmstadt, Germany James Clarke, Waterford Institute of Technology, Ireland
2 INCO-TRUST Canada US S. Korea Japan Australia INCO-TRUST: to set up a co-operation framework based on mutual interests & capabilities!
3 The Mechanisms INCO-TRUST Intl. Cooperation in ICT Security & Trust USA (NSF, DHS), Japan (JST), Australia (NICTA), The Consortium Canada, S. Korea THINK-TRUST Personalisation, Security, Accountability Vs Privacy & Human Values! The Consortium Composite Social Legal Technical Issue considerations
4 EU, US +++ Partnerships Understanding problems & technologies of common interest where synergy would be meaningful & add local (technological, legal, societal) depth? Web x.0, Persona/Data mgmt (technologies and approaches, storage, access, data transfer rights/jurisdiction), privacy,... Problems where the interconnected trans-national world of things (& attacks, impact, enforcement) behooves us to join forces where synergy is a no-brainer... Web x.0, interlinked infrastructures (& their protection), testbeds Can we jointly influence and leverage issues? Understanding the other sides priorities The mechanism Inco-Trust DEEDS Group
5 Thrust 1: Future Internet Design & its Security Mixed-mode, mobility, WSN - heterogeneity galore!!! Will need global inputs: Technical, implementation, + regulatory/legal involvement at varied levels/layers design & monitoring End user/device compatibilities? Architectural? Protocols? Multi-layered, federated security?... (PlanetLab-intl.) CyberThreats? (CyLab involvement) Reality: composition of internet is terribly diffuse with many many many international entities BUT this is also the critical and high impact co-operation area! Influence via international standards groups? DEEDS Group 5
6 Thrust 2: Global Persona Mgmt & Privacy Technological base: biometrics, crypto Usage facets: User-in-the loop privacy, confidentiality human/machine/device ID mgmt coverage: across enterprise lifecycle? partitioned (VM style) access with multiple personas? data storage, access rights across intl. data centers, intl. jurisdiction? repudiation, intl. liability rights? abuse? privacy: varied intl. legalities, varied social acceptability & conformance standards + regulation data level (mobile content? DRM?) intl. issues? DEEDS Group ISORC
7 Thrust 3: Infrastructure Protection App Level Users Businesses FI/Govt Impact Tech/Info Conduits Sys Level Public Custom UI Servers Telcos DB Servers Transactional & Data Confidentiality - Liability Driver Transactional & Data Integrity - Liability Driver Transactional & Data Availability - Usage Driver Operational Financial Confidence The Financial Infrastructure Protection (FIP) challenge is not just at a favorite (national) level or element(s) within the FI landscape, but the consolidated, coherent and consistent coverage of the overall environment the technological, usage and user elements on a global scale. DEEDS Group
8 WG1: Security, Dependability and Trust in the Future Internet What is our vision? Terms of Reference Scenarios for technological evolution Which TSD issues to address at generic level and which at application level? Security & trustworthiness of composite complex services Input from user perspective
9 WG1: Security, Dependability and Trust in the Future Internet Covering conceptual and implementation aspects across the spectrum of multi-layered network and services infrastructures Technological evolution and scalability Layering (polymorphic networks, physical, virtual, service, others ) Computing & communication paradigms (incl. protocols/middleware - functionality and monitoring) Emerging Threats Virtualization concepts Infrastructures and testbeds Across enabling technologies Core infrastructures, end users/devices,... Links with ETPs and FIA
10 WG2: Privacy and Trust in the Information Society What is our vision? Terms of Reference User centricity: User perspective: Social acceptability, usability, privacy, repudiation and liability issues Economic aspects: TSD as tradable service Trust and privacy aspects: convey problems and solutions E.g. short term & longer term scenarios that could make a difference
11 WG2: Privacy and Trust in the Information Society Covering conceptual, implementation and tradeoffs Human/machine/device ID (+ multiple persona) management Data collection, data storage, data access and data protection rights for businesses and consumers Usage facets: authentication, privacy, confidentiality Personal privacy versus societal and national needs Standards and regulatory issues Covering non-technical needs and concerns, from social and economic viewpoints (costs vs. benefits quantification), from the human and personal to the organisational and legal/governmental Across varied application domains and enabling technologies Biometrics, Crypto, Data/Identity Rights Management, Trusted Computing and Communication... Deployment case studies
12 Mapping WG Coverage Areas* of F5 Security Network infrastructures Identity management, privacy, trust policies Dynamic reconfigurable service architectures Critical Infrastructure Protection Underpinning technologies for trustworthy infrastructures * from EC F5 presentation
13 Related Topics raised during EU-US Workshops early identification and protection mechanisms for emerging global risks as the digital systems evolve permanently survey and identify the new possible attacks, the potential vulnerabilities due to complexity or just-in time services. look for new emerging risks, while being conscious of the incompleteness and the limitations of all these analyses. aspects related to attack distribution: information concerning possible attacks, who or what is responsible for the attack, the extent of the attack [1], information gathering; tracking and tracing for forensics to enable prosecution of cyber criminals; balancing technological challenges with legal aspects and privacy of individuals. [1] Taken from Infosec Research Council Hard Problems List - see doc
14 The Timeline & Mechanics of Inco-Trust Phase 0: Pre-Project EU-International Summit Series Workshops Phase 1: Understanding & connections of mutual beneficial interests Phase 2: Prioritization of mutual interests Platform for international collaboration & consensus building Input to the design of future research programs * Call Prioritizations * Intl. Project Formulations WS(EU 11 06) WS (US) 4 07 M9: (EU) M15: (US) M21: (JPN ) Final M27: (EU)
15 Next Steps 04 11/06 04/07 I-T: 1/08 NOW Q4/08 4/09 I-T WG WS-2 WS-1 Start Forma tions WS+1 ICT- TSD WP Call Please visit DEEDS Group
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics
EFFECTS+ Clustering of Trust and Security Research Projects, Identifying Results, Impact and Future Research Roadmap Topics Frances CLEARY 1, Keith HOWKER 2, Fabio MASSACCI 3, Nick WAINWRIGHT 4, Nick PAPANIKOLAOU
Agile Information Security Management in Software R&D
Agile Information Security Management in Software R&D Rational and WebSphere User Group Finland Seminar 29.01.2008 Reijo Savola Network and Information Security Research Coordinator VTT Technical Research
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
5G Public Private Partnership Objectives and opportunities
5G Public Private Partnership Objectives and opportunities CELTIC Plus event 2014 23-24 April, Monaco Bernard Barani European Commission - DG CONNECT Deputy Head of Unit Network Technologies "The views
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Cyber Security Test-bed TDL Download Corner. Achieving The Trust Paradigm Shift ATTPS. Arthur Leijtens, Daan Velthausz, Bicore, April, Brussel
Cyber Security Test-bed TDL Download Corner Arthur Leijtens, Daan Velthausz, Bicore, April, Brussel ATTPS Achieving The Trust Paradigm Shift Generic Trust Architecture ATTPS project has developed a generic
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Enterprise Portfolio Management
Enterprise Portfolio Management Managing large volumes of structured data Through its powerful capabilities as a structural modeling tool, ABACUS Summary provides of whitepaper a ready-to-go Summary solution
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
I. Introduction to Privacy: Common Principles and Approaches
I. Introduction to Privacy: Common Principles and Approaches A. A Modern History of Privacy a. Descriptions and definitions b. Historical and social origins c. Information types i. Personal and non-personal
NSF Workshop on Big Data Security and Privacy
NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
US Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
Energy Efficient Systems
Energy Efficient Systems Workshop Report (September 2014) Usman Wajid University of Manchester United Kingdom Produced as a result of Workshop on Energy Efficient Systems @ ICT4S conference, Stockholm
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
How can the Future Internet enable Smart Energy?
How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY
Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
The IT Maturity and the Threat to Corporate Business Strategies
The IT Maturity and the Threat to Corporate Business Strategies Michael Allen Director APM Solutions EMEA Compuware Corp. The Source of the Problem A Growing Dilemma Accelerating Complexity Increased Business
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Cloud Computing for Architects
Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood
IAPP Privacy Certification
IAPP Privacy Certification Program Introduction to the Certification Foundation copyright 2011, IAPP Overview Each candidate who seeks an IAPP privacy certification for the very first time must complete
Cloud Standards - A Telco Perspective
Cloud Standards - A Telco Perspective Abdellatif Benjelloun Touimi [email protected] Corporate Standards Department www.huawei.com TEN YEARS OF CONNECTING EUROPE HUAWEI TECHNOLOGIES CO.,
<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012
Cloud Archive Trends and Challenges PASIG Winter 2012 Raymond A. Clarke Enterprise Storage Consultant, Oracle Enterprise Solutions Group How Is PASIG Pronounced? Is it PASIG? Is it
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud [email protected]
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
The Future of Privacy Insights from the Internet technical community
The Future of Privacy Insights from the Internet technical community Internet Governance Forum 2010 Workshop: The Future of Privacy Presented by the Internet Society www.internetsociety.org An ongoing
5G Network Infrastructure for the Future Internet
5G Network Infrastructure for the Future Internet NCP/Florence Infoday Rémy Bayou, European Commission DG CONNECT, Unit "Network technologies" Mobile Communications: 1G to 4G The road to 5G 5G Challenges
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
INCO for Cyber Security. PTCIF: 21st Feb 2014
INCO for Cyber Security PTCIF: 21st Feb 2014 Abhishek Sharma Contents Need INCO Efforts BIC: EU-India EWG Takeaways Growing Cyber Security Threats ICTs have become an integral part of information society.
Overview TECHIS60241. Carry out risk assessment and management activities
Overview Information in all its forms is a vital component of the digital environment in which we live and work. The protection of information in its physical form is well understood but the protection
ICT 6: Cloud computing
computing Jorge GASÓS Software and Services, Cloud Unit DG Connect [email protected] Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,
ICT 7: Advanced cloud infrastructures and services. ICT 8: Boosting public sector productivity and innovation through cloud computing services
ICT 7: Advanced cloud infrastructures and services ICT 8: Boosting public sector productivity and innovation through cloud computing services ICT 9: Tools and Methods for Software Development Dan-Mihai
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
Software Development: The Next Security Frontier
James E. Molini, CISSP, CSSLP Microsoft Member, (ISC)² Advisory Board of the Americas [email protected] http://www.codeguard.org/blog Software Development: The Next Security Frontier De-perimiterization
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
On Premise Vs Cloud: Selection Approach & Implementation Strategies
On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile
Charter of Consumer Rights in the Digital World
DOC No: INFOSOC 37 08 DATE ISSUED: MARCH 2008 Charter of Consumer Rights in the Digital World Digital technologies contribute to an improvement in the quality of people s lives in many ways. They create
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
UNIFORM ECONOMIC TRANSACTION PROTOCOL. Payments and transactions several perspectives Utrecht, February 2 nd, 2015
UNIFORM ECONOMIC TRANSACTION PROTOCOL Payments and transactions several perspectives Utrecht, February 2 nd, 2015 Presentation given by FOCAFET For Open Convenient And Fair Economic Transactions 1 Who
L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti
L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti Francesco Maselli Technical Manager Italy Milano, 6 Maggio 2008 Aula magna di SIAM CONFIDENTIALITY STATEMENT AND COPYRIGHT
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
Workshop on Building international cooperation WG2 : Network Information Security / cyber security
Workshop on Building international cooperation WG2 : Network Information Security / cyber security Michel Riguidel [email protected] WG2 : network information & cybersecurity International
The Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
EUK-02-2016: South Korea: IoT joint research
HORIZON 2020 WP 2016-17 EUK-02-2016: South Korea: IoT joint research DG CONNECT/DG AGRI/DG MOVE/DG RTD European Commission RIA EUK-02-2016: South Korea: IoT joint research Challenge: IoT has moved from
ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) ([email protected])
ETSI M2M / onem2m and the need for semantics Joerg Swetina (NEC) ([email protected]) Outline of this presentation A simple picture of Machine-to-Machine (M2M) communications Where do standards apply
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)
Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical
Practitioner Certificate in Information Assurance Architecture (PCiIAA)
Practitioner Certificate in Information Assurance Architecture (PCiIAA) 15 th August, 2015 v2.1 Course Introduction 1.1. Overview A Security Architect (SA) is a senior-level enterprise architect role,
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Conceptual Model for Enterprise Governance. Walter L Wilson
Conceptual Model for Walter L Wilson Agenda Define the and Architecture Define a Ground Station as an Business Process Define Define Levels and Types of Introduce Model Define effects of Engineering 2
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
Enterprise Architecture Assessment Guide
Enterprise Architecture Assessment Guide Editorial Writer: J. Schekkerman Version 2.2 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve an organization s
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Cyber Security for your Connected Health Device
Cyber Security for your Connected Health Device Agenda Cyber Security Emerging Threats Implications to Healthcare Healthcare Response OpenSky s timeline Service Evolution Launch IT Optimization 2014 Geographic
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 4/17 Geneva, 11-20 February 2009 Ref. : TD 0244 Rev.2 Source:
Council of the European Union Brussels, 19 June 2015 (OR. en)
Council of the European Union Brussels, 19 June 2015 (OR. en) 9742/15 LIMITE ENFOPOL 141 NOTE From: Presidency To: Law Enforcement Working Party (European Network for the Protection of Public Figures -
REPORT. Next steps in cyber security
REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15
ICT 9: Tools and Methods for Software Development
ICT 9: Tools and Methods for Software Development Jorge GASOS DG CONNECT [email protected] R&D and Software Industry* Total R&D investments Total R&D headcount * Source: Truffle100 http://www.truffle100.com
